Essays about: "video encryption"

Showing result 1 - 5 of 11 essays containing the words video encryption.

  1. 1. Evaluation of Using the WebRTC Protocol as a Fully Distributed System : Measure, benchmark, and evaluate the performance of the WebRTC protocol

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Mryam Teklya Suyum; [2023]
    Keywords : Distributed Systems; WebRTC; WebSocket; HTTPS; Signaling Server; Peer-to-Peer Communication; RTP; RTCPeerConnection API; Performance Analysis; Latency RTT; Jitter; Packet Loss; Distribuerade system; WebRTC; WebSocket; HTTPS; signalserver; peer-to-peer-kommunikation; RTP; RTCPeerConnection API; prestandaanalys; latens RTT; jitter; paketförlust;

    Abstract : Syftet med detta examensarbete är att och utvärdera undersöka analysera och utvärdera prestandan hos WebRTC-protokollet, samt att utveckla en webbaserad klient med hjälp av JavaScript för distribuerade system och demonstrera protokollets användbarhet i ett verkligt scenario. Studien inkluderade användning av olika verktyg och bibliotek, såsom Socket. READ MORE

  2. 2. Towards Video Secure Streaming - Feasibility Study of Using an Obscuring Algorithm in Conjunction of H.264 Encoding and Compression

    University essay from Blekinge Tekniska Högskola/Institutionen för teknik och estetik

    Author : Deepika Challa; Surya Teja Vulavakayala; [2021]
    Keywords : H.264 codecs; H.264; video streaming; security in video streaming;

    Abstract : Technology advancement increases the usage of the internet day by day. One of the most used internet services is video streaming. The major advantage of video streaming is that it allows long distance communication between people without any delay. READ MORE

  3. 3. Ethical Hacking of a Smart Video Doorbell

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xin Liu; [2021]
    Keywords : smart video doorbell; IoT; security; penetration testing; threat modeling; smart video dörrklocka; IoT; säkerhet; penetrationstestning; hotmodellering;

    Abstract : With the rapid development of IoT, more and more cyber security threats occur in people’s lives. In addition, many IoT devices are closely related to lives and have a large number of users, such as smart home. Therefore, it is more worthy for the adversaries to launch attacks. READ MORE

  4. 4. Generation of random numbers from the text found in tweets

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lukas Gutenberg; Emil Olin; [2020]
    Keywords : ;

    Abstract : Random numbers are integral to many areas of computer science, it is used in everything from video games to encryption of important messages and simulations. These numbers are often generated by mathematical algorithms and it is highly important for these generators to generate numbers that are truly random and unpredictable, as patterns, cycles or other discrepancies might at worst cause serious security flaws that can be exploited. READ MORE

  5. 5. Modified and Efficient Image Encryption Algorithm Based on Chaos Theory, DNA Complementary Rules and SHA-256

    University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystem

    Author : Rizwan Haider; [2017]
    Keywords : block encryption; image cryptography; DNA; chaos; SHA-256;

    Abstract : The emerging topic, symmetric encryption technique for digital imagesusing chaotic function and DNA bases has recently drawn a lot ofattentions from the research community. The use of voice and visualmaterial as an addition to textual data has become more widespread. READ MORE